Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Security threats increasing with 70% using personal devices for work

Samsung has revealed the results of a multi-industry research study, which identifies the main technology challenges UK businesses have faced over the last year – and the key …

backup
Two new ways backup can protect enterprise SaaS data

Software-as-a-Service (SaaS) apps are a treasure trove of information. They’re where business takes place and decisions get made, so it’s not surprising that they’re …

World
Defending enterprise systems during a pandemic

A new report from Akamai looks back at 2020, examining some of the technological shifts and the patterns that emerged from lockdown-related internet spikes at the beginning of …

cloud
How to mitigate security risks as cloud services adoption spikes

Millions have flocked to video-conferencing solutions and organizations have relied more heavily on various applications (such as G Suite for end users, Azure for developers, …

SASE
Only 12% of enterprises have fully embraced SASE

Although many public and private sector organizations have elements of SASE in their IT stack, only 12% worldwide currently have a comprehensive SASE architecture, according …

architecture
Why enterprises need rugged devices with integrated endpoint management systems

The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …

remote work
Enable secure remote workspaces without trashing your entire IT infrastructure

Roughly 12 months ago, when the world shifted seemingly overnight to work-from-home, few companies were well-positioned to seamlessly scale their remote work solutions. Legacy …

money
Cybersecurity spending for critical infrastructure to reach $105.99 billion in 2021

Cybersecurity spending in critical infrastructure has been little impacted by the COVID-19 pandemic, save for some reshuffling on where that spend is most needed. The effect …

Terminal
Enterprises average one root access orphan key on every enterprise server

SSH machine identities are critical to digital transformation strategies, as they authenticate privileged access between machines and are ubiquitous across enterprise …

puzzle
Kick off the year with a new vendor management spring cleaning strategy

Your company’s vendor management program may not be what you need to get the most out of your cybersecurity vendors, so I’ll focus on a Cyber Vendor Optimization Strategy. The …

digital transformation
IT leaders concerned about their ability to keep up with digital transformation

IT leaders have growing concerns about their ability to keep up with digital transformation, a Dynatrace survey of 700 CIOs reveals. Traditional IT operating models with …

gap
Understanding third-party hacks in the aftermath of SolarWinds

In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the board of directors …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools